Monero Transaction 16db87eabb67064fe054dcd514170c91a17acae660baefe7043b9f418045422f

Autorefresh is OFF

Tx hash: 16db87eabb67064fe054dcd514170c91a17acae660baefe7043b9f418045422f

Tx prefix hash: ad5c2f8a8925886ec6f40115217ffcea4b6faaee54cc89cab4a61f9e0af582df
Tx public key: 89ae0f8f47e1ee36e69dd85a72652c4e954559c72f90c5dd13d515833c8ef14a
Payment id: 464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec

Transaction 16db87eabb67064fe054dcd514170c91a17acae660baefe7043b9f418045422f was carried out on the Monero network on 2014-07-22 13:06:36. The transaction has 3102309 confirmations. Total output fee is 0.010000000000 XMR.

Timestamp: 1406034396 Timestamp [UTC]: 2014-07-22 13:06:36 Age [y:d:h:m:s]: 10:063:21:42:39
Block: 139991 Fee (per_kB): 0.010000000000 (0.028209366391) Tx size: 0.3545 kB
Tx version: 1 No of confirmations: 3102309 RingCT/type: no
Extra: 022100464c3a8cebbdbeaa9f0a89ed34fe495792ea0e15f94defbd229c08c68117d3ec0189ae0f8f47e1ee36e69dd85a72652c4e954559c72f90c5dd13d515833c8ef14a

2 output(s) for total of 1.020000000000 xmr

stealth address amount amount idx tag
00: ad8a30928119203ec1ac1c069b09344e7fb5d07afcc2f6164601a905274cdcad 0.020000000000 201775 of 381490 -
01: 58c686546b8aedb1741b4c49de0ff2b3a704a58bef076b098ef211fc4b40830b 1.000000000000 124736 of 874629 -

Check which outputs belong to given Monero address/subaddress and viewkey

For RingCT transactions, outputs' amounts are also decoded
Note: address/subaddress and viewkey are sent to the server, as the calculations are done on the server side



Prove to someone that you have sent them Monero in this transaction

Tx private key can be obtained using get_tx_key command in monero-wallet-cli command line tool
Note: address/subaddress and tx private key are sent to the server, as the calculations are done on the server side



Inputs' ring size time scale (from 2014-07-22 10:56:33 till 2014-07-22 13:41:14; resolution: 0.00 days)

  • |____________________________________________________________________________________________________________*_____________________________________________________________|
  • |______________________________________________________________*___________________________________________________________________________________________________________|

2 inputs(s) for total of 1.030000000000 xmr

key image 00: 52fa5a05b534fef72f30415fce36a7b04dbaa7d7d1eae0395ae0ffc4e0e766d9 amount: 1.000000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: c569a24d2e892e5bf1b9eb78c867f22c7ff2b1a9279d720ebb2d417a77553d74 00139965 1 14/60 2014-07-22 12:41:14 10:063:22:08:01
key image 01: a126a70a7b43d0d943399ce6ffd48221b1b4fd26dc20c8eb27f26c720c2ad02d amount: 0.030000000000
ring members blk ring size in/out timestamp age [y:d:h:m:s]
- 00: a77b632498b3b5f8bf2755afa1fa0eb0c6dad296d94e678591fe199c7e60f0dd 00139914 1 5/3 2014-07-22 11:56:33 10:063:22:52:42
{ "version": 1, "unlock_time": 0, "vin": [ { "key": { "amount": 1000000000000, "key_offsets": [ 124706 ], "k_image": "52fa5a05b534fef72f30415fce36a7b04dbaa7d7d1eae0395ae0ffc4e0e766d9" } }, { "key": { "amount": 30000000000, "key_offsets": [ 150785 ], "k_image": "a126a70a7b43d0d943399ce6ffd48221b1b4fd26dc20c8eb27f26c720c2ad02d" } } ], "vout": [ { "amount": 20000000000, "target": { "key": "ad8a30928119203ec1ac1c069b09344e7fb5d07afcc2f6164601a905274cdcad" } }, { "amount": 1000000000000, "target": { "key": "58c686546b8aedb1741b4c49de0ff2b3a704a58bef076b098ef211fc4b40830b" } } ], "extra": [ 2, 33, 0, 70, 76, 58, 140, 235, 189, 190, 170, 159, 10, 137, 237, 52, 254, 73, 87, 146, 234, 14, 21, 249, 77, 239, 189, 34, 156, 8, 198, 129, 23, 211, 236, 1, 137, 174, 15, 143, 71, 225, 238, 54, 230, 157, 216, 90, 114, 101, 44, 78, 149, 69, 89, 199, 47, 144, 197, 221, 19, 213, 21, 131, 60, 142, 241, 74 ], "signatures": [ "dd1b9ce73f05a59f2b606fb7e62cce3af33ef59824876c88f4643c2dd079b50991fb334204c6e3df4ce523b77bb56959260b317e25615a011317402dad922803", "3fa3a8d229324e102b6cd5e2b96a827d0abbc3d3b8ae698e22e45dfa1c049c08610e7fa3d5e78dd590aa457588272cc90449c94f7bcf0221f1d626db941eb20c"] }


Less details
source code | moneroexplorer